Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+8g5KFQM=OAiRWPv-UcR7hwiuJdZ87usuUkFbR09rq-W_h_+A@mail.gmail.com>
Date: Sun, 18 Jan 2015 11:43:14 -0800
From: Jim Meyering <jim@...ering.net>
To: oss-security@...ts.openwall.com
Subject: CVE request: grep heap buffer overrun

Invoking grep with a carefully crafted combination of input and regexp
can cause a segfault and/or reading from uninitialized memory.

Here's how it evolved: http://bugs.gnu.org/19563
Here's the upstream fix:
http://git.sv.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2

This is particularly relevant for those who do not exec grep directly,
but rather embed parts of grep in another tool.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.